01-15-2010 04:35 AM - edited 03-09-2019 10:47 PM
Hello,
I am looking to set up an IN-Band Virtual Gateway in Central Deployment where my CAS in the DMZ and my CAM is in the LAN. Here is a drawing of the setup:
http://www.flickr.com/photos/31154535@N07/4274326599/sizes/o/
Right now I only have eth0 of the CAS plugged into DMZ switch 1. Eth0 has its default gateway set to the SVI of VLAN 710.
All I want to do at this point is add the CAS to the CAM but I am unable to do this. During the perfigo setup I assigned both interfaces the same IP and did not enable anything else like Management VLAN or VLAN tagging. My TAC guy tells me I cant add the second NIC until I have it in the CAM.
I created ACLs for CAS CAM communication as well.
But something is wrong. When I do a TCPdump on the eth0 interface while I try to add the CAS to the CAM I don’t even see packets getting there.
What am I doing wrong? Doesnt the FW need to see the CAS as a L2 device before we can get anywhere with this? Because right now the CAS is not even in the ARP table of the ASA.
Thanks,
Pedro
01-15-2010 09:20 PM
Pedro,
From the CAS console, can you ping the default gateway? If yes, can you ping the ASA? If yes, the CAM?
If no to any of these, where's the traffic blocked? If no to the first question, then you have basic connectivity issues to resolve first.
HTH,
Faisal
01-18-2010 09:35 AM
Hey Faisal,
From the CAS I can ping the SVI of the L3 VLAN for the trusted interface (vlan710 in the picture), but I cannot ping the ASA. The subinterface on the ASA is on VLAN 709 which is what the documentation calls for i.e. that the untrusted interface of the CAS and the FW need to be on the same L2 vlan.
Is that correct?
Here is some routing information:
From the DMZ switch where the CAS is dual homed:
Gateway of last resort is 192.168.10.1 to network 0.0.0.0
192.168.10.0/25 is subnetted, 1 subnets
C 192.168.10.0 is directly connected, Vlan1
10.0.0.0/28 is subnetted, 1 subnets
C 10.1.7.96 is directly connected, Vlan710
S* 0.0.0.0/0 [1/0] via 192.168.10.1
I want to mention that this switch has a trunked port to the failover FW.
From the other DMZ switch (in the picture you can see that there are two DMZ switches that are trunked together and running VTP transparent).
Gateway of last resort is 192.168.10.1 to network 0.0.0.0
192.168.10.0/25 is subnetted, 1 subnets
C 192.168.10.0 is directly connected, Vlan1
S* 0.0.0.0/0 [1/0] via 192.168.10.1
I will also mention that this switch has a trunked port to the active FW.
Now from the FW:
sh route | inclu 10.1.7
C 10.1.7.8 255.255.255.248 is directly connected, NAC_homeagents_vlan702
C 10.1.7.96 255.255.255.240 is directly connected, NAC_homeagents_vlan709
I dont know if this is a L3 problem or not, because it seems to me that the FW needs to see the CAS as a L2 device no?
Thanks,
Pete
02-06-2010 09:58 PM
Documenting the solution for this issue for other potential designs.
If you're doing VPN with CAS in-line in a VGW setup, you have to make sure that the CAS's trusted side through which CAS/CAM communication flows doesn't go through the same ASA. If they are going through the same ASA, it will have problems identifying which VLAN to send the manamgement traffic through and cause an unnecessarily complex and potentially impossible design. You might be able to make it work with RIP, but that again would be a pretty complex design with possible PBRs involved.
HTH,
Faisal
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide